Results 51 to 60 of about 7,441 (248)

Universal Entanglement and an Information‐Complete Quantum Theory

open access: yesAdvanced Physics Research, EarlyView.
This Perspective summarize an informationcomplete quantum theory which describes a fully quantum world without any classical systems and concepts. Here spacetime/gravity, having to be a physical quantum system, universally entangles matter (matter fermions and their gauge fields) as an indivisible trinity, and encodes information‐complete physical ...
Zeng‐Bing Chen
wiley   +1 more source

Distributed Cryptographic Protocols

open access: yes, 2023
[ES] La confianza es la base de las sociedades modernas. Sin embargo, las relaciones basadas en confianza son difíciles de establecer y pueden ser explotadas fácilmente con resultados devastadores. En esta tesis exploramos el uso de protocolos criptográficos distribuidos para construir sistemas confiables donde la confianza se vea reemplazada por ...
openaire   +2 more sources

Amplified Quantum Correlation via Dynamical Modulation in Qubit‐Qutrit System under Markovian and Non‐Markovian Noise

open access: yesAdvanced Physics Research, EarlyView.
This study proposes an innovative approach to strengthen and amplify entanglement in a hybrid qubit–qutrit system driven by a dynamic field. By analyzing the system's dynamics under both Markovian and non‐Markovian environments, we show that specific field values optimize entanglement.
Polislin Fabrice Wonang   +5 more
wiley   +1 more source

Superposition Attacks on Cryptographic Protocols [PDF]

open access: yes, 2014
Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece of information.
Ivan Damgård   +3 more
openaire   +4 more sources

Tomtit‐Raven Evolutionary Selector‐Reinforced Attention‐Driven: A High‐Performance and Computationally Efficient Cyber Threat Detection Framework for Smart Grids

open access: yesEnergy Science &Engineering, EarlyView.
Overview of the proposed work. ABSTRACT Identifying cyber threats maintains the security and operational stability of smart grid systems because they experience escalating attacks that endanger both operating data reliability and system stability and electricity grid performance.
Priya R. Karpaga   +3 more
wiley   +1 more source

Efficient Robust Spontaneous Parametric Down‐Conversion via Detuning Modulated Composite Segments Designs

open access: yesLaser &Photonics Reviews, EarlyView.
Detuning modulated composite segmentation (DMCS) enables robust spontaneous parametric down‐conversion with sevenfold improved temperature stability compared to conventional designs, opening new possibilities for stable quantum photon sources. ABSTRACT Spontaneous parametric down conversion (SPDC) holds a pivotal role in quantum physics, facilitating ...
Muhammad Erew   +5 more
wiley   +1 more source

Model checking of trusted cryptographic module

open access: yesTongxin xuebao, 2010
The formal security analysis was given for the trusted cryptographic module according to the specification of the trusted cryptographic module using model checking tools. The flaws in the AP protocol were pointed and the solution was given.
CHEN Xiao-feng, FENG Deng-guo
doaj   +2 more sources

Privacy-Preserving Set Intersection Protocol Based on SM2 Oblivious Transfer

open access: yesComputers
Private Set Intersection (PSI) is a fundamental cryptographic primitive in privacy-preserving computation and has been widely applied in federated learning, secure data sharing, and privacy-aware data analytics.
Zhibo Guan   +7 more
doaj   +1 more source

On the cryptographic properties of “Limonnik-3” AKE scheme

open access: yesБезопасность информационных технологий, 2019
We study the “Limonnik-3” authenticated key exchange protocol which is a part of Standardization recommendations R 1323565.1.004-2017 “Authenticated key agreement schemes based on public keys”, officially adopted in Russia in 2017, alongside with the ...
Sergey V. Grebnev
doaj   +1 more source

A secure mutual authentication procedure, generate the key fiscal basis, and fiscal data protection

open access: yesБезопасность информационных технологий, 2018
The paper describes cryptographic transformation for mutual authentication and creation of the fiscal sign key. This transformation based on using block encryption cipher named «Kuznetchik», described in the national standard of the Russian Federation ...
Igor Y. Zhukov, Oleg N. Murashov
doaj   +1 more source

Home - About - Disclaimer - Privacy